
International Journal of Security and Networks
2014 Vol.9 No.3
| Pages | Title and author(s) |
| 125-132 | A new adaptive intrusion detection system based on the intersection of two different classifiersA. Ahmim; N. Ghoualmi-Zine DOI: 10.1504/IJSN.2014.065710 |
| 133-143 | Assumptions and conditions for mix networks: analysis, clarification and improvementKun Peng DOI: 10.1504/IJSN.2014.065719 |
| 144-153 | Spam diffusion in a social network initiated by hacked e-mail accountsGhita Mezzour; Kathleen M. Carley DOI: 10.1504/IJSN.2014.065709 |
| 154-166 | Network vulnerability analysis of the Player command and control protocolJohn T. Hagen; Barry E. Mullins DOI: 10.1504/IJSN.2014.065708 |
| 167-176 | Firewalls anomalies severity evaluation and classificationKamel Karoui; Fakher Ben Ftima; Henda Ben Ghezala DOI: 10.1504/IJSN.2014.065712 |
| 177-184 | Signalling optimisation for VoIP service in All-IP networkJongdeug Kim; Taehyun Jeon DOI: 10.1504/IJSN.2014.065721 |